Point of View

#Cyberchat: Cyber Threats of 2016 with Matt Devost of Accenture

Each episode of the HfS #Cyberchat features HfS Research analyst Fred McClimans going head-to-head in a discussion with a fellow industry insider, delving into the threats, the tools, and the strategies that define the state of cyber security today.

 

The cyber threats today are both diverse and impactful, with threat actors continually maneuvering to stay one step ahead of the enterprise cyber security team. Understanding how to properly identify and assess vulnerabilities is key to shifting from reactive to proactive strategies – a capability that is core to increasing the level of enterprise security maturity.

 

In this edition of the HfS #Cyberchat, Fred McClimans of HfS Research sits down with Matt Devost, Managing Director of Accenture’s Vulnerability and Threat Intelligence Practice to discuss the state of Cyber Security and the trends moving enterprise security forward. Matt and his team have developed a series of “adversary impersonation” techniques where they can develop and implement bespoke, real-time attacks using the skills and tools that would be used by real-world threat actors, from state-sponsored organizations to organized crime and “threat for hire” teams.

 

 

Some of the key topics highlighted in this discussion include:

 

  • The role of threat-centric perspectives in identifying and addressing cyber security vulnerabilities
  • Leveraging real-time, real-world adversary impersonation as a means to effectively test the security and incident response capabilities of an enterprise security team
  • How the rise of “mass risk”attacks and record aggregation are increasing the risk faced by both enterprises and individuals
  • Understanding the challenges  of state-sponsored and  critical infrastructure attacks
  • The strategy and end-game behind enterprise spear-phishing attacks
  • The importance of a dual physical/digital security strategy
  • Why the Internet of Things (IoT) is really the Internet of Risky Things
  • What to expect with the evolution of attack vectors and threat behavior over the coming 18-24 months

 

Sign in to view or download this research.

Login

Register

Insight. Inspiration. Impact.

Register now for immediate access of HFS' research, data and forward looking trends.

Get Started

Download Research

    Sign In

    Sign up for a free
    research account

    With the exception of our Horizons reports, most of our research is available for free on our website. Sign up for a free account and start realizing the power of insights now.

    Digests/Newsletters: Overviews of the latest news, insight, and research by HFS.

    HFS Events: Exclusive invitations to HFS webinars, roundtables, and summits, bringing together key industry stakeholders focused on major innovations impacting business operations.

    By registering you agree to our privacy policy.

    I hereby consent that HFS Research can process my personal data.

    Premium Access

    Our premium subscription gives enterprise clients access to our complete library of proprietary research, direct access to our industry analysts, and other benefits.

    Contact us at [email protected] for more information on premium access.

    Help

    If you are looking for help getting in touch with someone from HFS, please click the chat button to the bottom right of your screen to start a conversation with a member of our team.

    [email protected]

      Contact Ask HFS AI Support